Noncooperative Games for Control of Networked Systems

Noncooperative game theory is used as a basis for analyzing, developing, and implementing decision, control, and resource allocation schemes to address v arious network control problems such as congestion control, code division multiple access (CDMA ) power control, and network intrusion detection and response. In the cases of CDMA power contr ol and congestion control, a fairly general, distributed, market-based resource allocation f ramework is developed and analyzed. The applicability of the underlying noncooperative network ga me’s principles to both network control problems can be considered as an indicator of the genera lity and usefulness of this approach. Based on this general framework, various algorithms custom ized according to the specific nature of the network at hand are developed. Making use of a variety o f control theoretic tools such as Lyapunov and hybrid system theories, stability and robus tnes properties of these algorithms are studied rigorously. An analysis of robustness with resp ect to feedback delays, which is of particular importance, is provided for most of the algorith ms considered. In the case of network intrusion detection, dynamic noncooperative games are uti lized to model the decision and analysis processes in an IDS. Again, both generic and system-specific s hemes and models are considered. In addition to the theoretical analysis of the network contr l problems addressed, implementation related aspects of the schemes developed are investigated. For each algorithm, theoretical results obtained are supported and demonstrated either via high-le vel MATLAB simulations or using the NS-2 packet level network simulator. Through extensive sim ulations, applicability and underlying assumptions of the theoretical models are verified.

[1]  Tansu Alpcan,et al.  A utility-based congestion control scheme for Internet-style networks with delay , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Samuel N. Hamilton,et al.  The Role of Game Theory in Information Warfare , 2002 .

[3]  Donald E. Knuth The Art of Computer Programming 2 / Seminumerical Algorithms , 1971 .

[4]  John N. Tsitsiklis,et al.  Parallel and distributed computation , 1989 .

[5]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[6]  Larry L. Peterson,et al.  TCP Vegas: End to End Congestion Avoidance on a Global Internet , 1995, IEEE J. Sel. Areas Commun..

[7]  L. Devroye Non-Uniform Random Variate Generation , 1986 .

[8]  E. Rabinovitch The neverending saga of internet security: why? how? and what to do next? , 2001 .

[9]  T. Basar,et al.  A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[10]  Kymie M. C. Tan,et al.  Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits , 2002, RAID.

[11]  Derong Liu The Mathematics of Internet Congestion Control , 2005, IEEE Transactions on Automatic Control.

[12]  Ming-Yuh Huang,et al.  A large scale distributed intrusion detection framework based on attack strategy analysis , 1999, Comput. Networks.

[13]  Catherine Rosenberg,et al.  A game theoretic framework for bandwidth allocation and pricing in broadband networks , 2000, TNET.

[14]  Peter Marbach,et al.  Downlink resource allocation and pricing for wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[15]  Bruce W. Schmeiser,et al.  Random variate generation , 1981, WSC '81.

[16]  Tansu Alpcan,et al.  A power control game based on outage probabilities for multicell wireless data networks , 2004, IEEE Transactions on Wireless Communications.

[17]  J. Yorke Asymptotic stability for one dimensional differential-delay equations☆ , 1970 .

[18]  R. Srikant,et al.  End-to-end congestion control schemes: utility functions, random losses and ECN marks , 2003, TNET.

[19]  Mark Handley,et al.  Equation-based congestion control for unicast applications , 2000, SIGCOMM.

[20]  Sally Floyd,et al.  Promoting the use of end-to-end congestion control in the Internet , 1999, TNET.

[21]  K. Schittkowski,et al.  NONLINEAR PROGRAMMING , 2022 .

[22]  Eitan Altman,et al.  Multiuser rate-based flow control , 1998, IEEE Trans. Commun..

[23]  A. N. Zincir-Heywood,et al.  Intrusion Detection Systems , 2008 .

[24]  R. Srikant,et al.  A time-scale decomposition approach to adaptive explicit congestion notification (ECN) marking , 2002, IEEE Trans. Autom. Control..

[25]  Rayadurgam Srikant,et al.  The Mathematics of Internet Congestion Control , 2003 .

[26]  Steven H. Low,et al.  Optimization flow control—I: basic algorithm and convergence , 1999, TNET.

[27]  Mark Handley,et al.  Equation-based congestion control for unicast applications , 2000, SIGCOMM 2000.

[28]  Subhrakanti Dey,et al.  Optimal power control in wireless data networks with outage-based utility guarantees , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[29]  Roy D. Yates,et al.  A Framework for Uplink Power Control in Cellular Radio Systems , 1995, IEEE J. Sel. Areas Commun..

[30]  Tansu Alpcan,et al.  A Hybrid Noncooperative Game Model for Wireless Communications , 2007 .

[31]  Samuel N. Hamilton,et al.  Challenges in Applying Game Theory to the Domain of Information Warfare , 2001 .

[32]  Jean C. Walrand,et al.  Fair end-to-end window-based congestion control , 2000, TNET.

[33]  Eitan Altman,et al.  Nash equilibria for combined flow control and routing in networks: asymptotic behavior for a large number of users , 2002, IEEE Trans. Autom. Control..

[34]  Roy D. Yates,et al.  Stochastic power control for cellular radio systems , 1998, IEEE Trans. Commun..

[35]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[36]  Chi Wan Sung,et al.  Power control for multirate multimedia CDMA systems , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[37]  Nancy R. Mead,et al.  Survivable Network Systems: An Emerging Discipline , 1997 .

[38]  Giuseppe Carlo Calafiore,et al.  Randomized algorithms for probabilistic robustness with real and complex structured uncertainty , 2000, IEEE Trans. Autom. Control..

[39]  Richard J. La,et al.  Charge-sensitive TCP and rate control in the Internet , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[40]  Jonas Blom Power Control in Cellular Radio Systems , 1998 .

[41]  Vasant Honavar,et al.  Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).

[42]  Eugene H. Spafford,et al.  Using internal sensors for computer intrusion detection , 2001 .

[43]  T. Basar,et al.  Global stability analysis of an end-to-end congestion control scheme for general topology networks with delay , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[44]  A. I. Elwalid Analysis of adaptive rate-based congestion control for high-speed wide-area networks , 1995, Proceedings IEEE International Conference on Communications ICC '95.

[45]  P. Hellekalek Good random number generators are (not so) easy to find , 1998 .

[46]  A. Morse,et al.  Stability of switched systems with average dwell-time , 1999, Proceedings of the 38th IEEE Conference on Decision and Control (Cat. No.99CH36304).

[47]  Asrar U. H. Sheikh,et al.  Outage probability analysis for microcell mobile radio systems with cochannel interferers in Rician/Rayleigh fading environment , 1990 .

[48]  Ching-Yao Huang,et al.  Non-cooperative uplink power control in cellular radio systems , 1998, Wirel. Networks.

[49]  Ariel Orda,et al.  Competitive routing in multiuser communication networks , 1993, TNET.

[50]  日本自動制御協会,et al.  システムと制御 = Systems and control , 1971 .

[51]  R. Srikant,et al.  End-to-end congestion control schemes: utility functions, random losses and ECN marks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[52]  T. Basar,et al.  A game-theoretic framework for congestion control in general topology networks , 2002, Proceedings of the 41st IEEE Conference on Decision and Control, 2002..

[53]  Tansu Alpcan,et al.  A discrete-event systems model for congestion control , 2005 .

[54]  J. Doob Stochastic processes , 1953 .

[55]  Harald Niederreiter,et al.  Random number generation and Quasi-Monte Carlo methods , 1992, CBMS-NSF regional conference series in applied mathematics.

[56]  D. Goodman,et al.  A New Framework for Power Control in Wireless Data Networks: Games, Utility, and Pricing , 2002 .

[57]  Donald E. Knuth,et al.  The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .

[58]  Cem U. Saraydar,et al.  Pricing and power control in a multicell wireless data network , 2001, IEEE J. Sel. Areas Commun..

[59]  Donald F. Towsley,et al.  Unresponsive flows and AQM performance , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[60]  R. Srikant,et al.  Revenue-maximizing pricing and capacity expansion in a many-users regime , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[61]  Gregg H. Gunsch,et al.  An artificial immune system architecture for computer security applications , 2002, IEEE Trans. Evol. Comput..

[62]  Daniel Liberzon,et al.  Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.

[63]  Jean C. Walrand,et al.  Analysis and comparison of TCP Reno and Vegas , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[64]  J. Goodman Note on Existence and Uniqueness of Equilibrium Points for Concave N-Person Games , 1965 .

[65]  Tansu Alpcan,et al.  Randomized algorithms for stability and robustness analysis of high-speed communication networks , 2005, IEEE Transactions on Neural Networks.

[66]  Andrew P. Moore,et al.  Attack Modeling for Information Security and Survivability , 2001 .

[67]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[68]  Tansu Alpcan,et al.  Distributed Algorithms for Nash Equilibria of Flow Control Games , 2005 .

[69]  James A. Mahaffey,et al.  Multiple Self-Organizing Maps for Intrusion Detection , 2000 .

[70]  Tansu Alpcan,et al.  Power control for multicell CDMA wireless networks: A team optimization approach , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[71]  Eitan Altman,et al.  Competitive routing in networks with polynomial costs , 2002, IEEE Trans. Autom. Control..

[72]  Richard J. La,et al.  Utility-based rate control in the Internet for elastic traffic , 2002, TNET.

[73]  Van Jacobson,et al.  Congestion avoidance and control , 1988, SIGCOMM '88.

[74]  Eugene H. Spafford,et al.  An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[75]  Cem U. Saraydar,et al.  Pareto efficiency of pricing-based power control in wireless data networks , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).

[76]  T. A. Burton,et al.  Stability and Periodic Solutions of Ordinary and Functional Differential Equations , 1986 .

[77]  Subhrakanti Dey,et al.  Optimal Power Control in CDMA Networks with Constraints on Outage Probability , 2003 .

[78]  John T. Wen,et al.  A unifying passivity framework for network flow control , 2004, IEEE Transactions on Automatic Control.

[79]  Ramesh Johari,et al.  End-to-end congestion control for the internet: delays and stability , 2001, TNET.

[80]  T. Basar,et al.  A game theoretic approach to decision and analysis in network intrusion detection , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[81]  Andrew S. Tanenbaum,et al.  Computer networks (3rd ed.) , 1996 .

[82]  Laurent Massoulié,et al.  Stability of distributed congestion control with heterogeneous feedback delays , 2002, IEEE Trans. Autom. Control..

[83]  John T. Wen,et al.  Robustness of network flow control against disturbances and time-delay , 2004, Syst. Control. Lett..

[84]  Frank Kelly,et al.  Rate control for communication networks: shadow prices, proportional fairness and stability , 1998, J. Oper. Res. Soc..

[85]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[86]  Andrew P. Moore,et al.  Foundations for Survivable Systems Engineering , 2002 .

[87]  H. Chernoff A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .

[88]  Glenn Vinnicombe,et al.  ON THE STABILITY OF NETWORKS OPERATING TCP-LIKE CONGESTION CONTROL , 2002 .

[89]  Stephen P. Boyd,et al.  Optimal power control in interference-limited fading wireless channels with outage-probability specifications , 2002, IEEE Trans. Wirel. Commun..

[90]  R. Tempo,et al.  Randomized Algorithms for Analysis and Control of Uncertain Systems , 2004 .

[91]  Vasilios A. Siris,et al.  Resource control for elastic traffic in CDMA networks , 2002, MobiCom '02.

[92]  Mathukumalli Vidyasagar,et al.  A Theory of Learning and Generalization: With Applications to Neural Networks and Control Systems , 1997 .

[93]  Rayadurgam Srikant,et al.  Controlling the Internet: a survey and some new results , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[94]  N. K. Bose,et al.  Neural Network Fundamentals with Graphs, Algorithms and Applications , 1995 .

[95]  R. Srikant,et al.  Global stability of congestion controllers for the Internet , 2003, IEEE Trans. Autom. Control..

[96]  Robert J. Plemmons,et al.  Nonnegative Matrices in the Mathematical Sciences , 1979, Classics in Applied Mathematics.

[97]  Eitan Altman,et al.  CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.

[98]  Tansu Alpcan,et al.  A hybrid systems model for power control in multicell wireless data networks , 2004, Perform. Evaluation.